EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

55 Qs

quiz-placeholder

Similar activities

MIL for Completion

MIL for Completion

12th Grade

60 Qs

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

12th Grade

55 Qs

CSP 2024 Final Redux V2

CSP 2024 Final Redux V2

12th Grade

50 Qs

G12-CSS-Q1-M1-M4

G12-CSS-Q1-M1-M4

12th Grade

50 Qs

Citation styles: APA and Chicago

Citation styles: APA and Chicago

7th - 12th Grade

50 Qs

The Internet - AP CSP Unit 4

The Internet - AP CSP Unit 4

9th - 12th Grade

53 Qs

Topic 3.1 Areas of Computer Ethics

Topic 3.1 Areas of Computer Ethics

12th Grade

53 Qs

3.1 Risks

3.1 Risks

9th - 12th Grade

53 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

Assessment

Quiz

Computers

12th Grade

Medium

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information security?

Ease of use

Well-being of information and infrastructure

Increasing network speed

Reducing software costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an element of information security?

Confidentiality

Integrity

Usability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a challenge in information security?

Abundance of cybersecurity professionals

Simple privacy regulations

Compliance with government laws and regulations

Easy centralization of security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a motive behind information security attacks?

Enhancing user experience

Disrupting business continuity

Improving software functionality

Increasing network bandwidth

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of passive attacks?

Tampering with data in transit

Intercepting and monitoring network traffic

Using privileged access to violate rules

Tampering with hardware or software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an active attack?

Sniffing and eavesdropping

Footprinting

Man-in-the-Middle

Network traffic analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves using privileged access to violate rules?

Passive Attack

Insider Attack

Distribution Attack

Close-in Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?